summary refs log tree commit diff
path: root/synapse/api/ratelimiting.py (unfollow)
Commit message (Collapse)AuthorFilesLines
2020-11-26Improve documentation how to configure prometheus for workers (#8822)Dirk Klimpel3-20/+65
2020-11-25Remove deprecated `/_matrix/client/*/admin` endpoints (#8785)Dirk Klimpel16-68/+176
These are now only available via `/_synapse/admin/v1`.
2020-11-25Fix the formatting of push config section (#8818)Andrew Morgan3-29/+40
This PR updates the push config's formatting to better align with our [code style guidelines](https://github.com/matrix-org/synapse/blob/develop/docs/code_style.md#configuration-file-format).
2020-11-25Speed up remote invite rejection database call (#8815)Andrew Morgan3-6/+45
This is another PR that grew out of #6739. The existing code for checking whether a user is currently invited to a room when they want to leave the room looks like the following: https://github.com/matrix-org/synapse/blob/f737368a26bb9eea401fcc3a5bdd7e0b59e91f09/synapse/handlers/room_member.py#L518-L540 It calls `get_invite_for_local_user_in_room`, which will actually query *all* rooms the user has been invited to, before iterating over them and matching via the room ID. It will then return a tuple of a lot of information which we pull the event ID out of. I need to do a similar check for knocking, but this code wasn't very efficient. I then tried to write a different implementation using `StateHandler.get_current_state` but this actually didn't work as we haven't *joined* the room yet - we've only been invited to it. That means that only certain tables in Synapse have our desired `invite` membership state. One of those tables is `local_current_membership`. So I wrote a store method that just queries that table instead
2020-11-25Add additional type hints to HTTP client. (#8812)Patrick Cloke5-149/+142
This also removes some duplicated code between the simple HTTP client and matrix federation client.
2020-11-25Support trying multiple localparts for OpenID Connect. (#8801)Patrick Cloke6-136/+330
Abstracts the SAML and OpenID Connect code which attempts to regenerate the localpart of a matrix ID if it is already in use.
2020-11-25Add type hints to matrix federation client / agent. (#8806)Patrick Cloke6-195/+231
2020-11-24Clarify documentation of the admin list media API (#8795)Dirk Klimpel2-0/+2
Clarify that the list media API only shows media from unencrypted events.
2020-11-24Add a script to sign arbitrary json objects. (#8772)Richard van der Hoff3-0/+129
2020-11-24Update turn-howto (#8779)Richard van der Hoff2-8/+124
Some hopefully-useful notes on setting up a turnserver.
2020-11-23Properly report user-agent/IP during registration of SSO users. (#8784)Patrick Cloke6-122/+173
This also expands type-hints to the SSO and registration code. Refactors the CAS code to more closely match OIDC/SAML.
2020-11-23Fix synctl and duplicate worker spawning (#8798)Waylon Cude2-0/+8
Synctl did not check if a worker thread was already running when using `synctl start` and would naively start a fresh copy. This would sometimes lead to cases where many duplicate copies of a single worker would run. This fix adds a pid check when starting worker threads and synctl will now refuse to start individual workers if they're already running.
2020-11-23Improve logging of the mapping from SSO IDs to Matrix IDs. (#8773)Andrew Morgan3-5/+13
2020-11-23INSTALL: Fix setting content-type on well-known (#8793)Daniele Sluijters2-1/+2
When using `add_header` nginx will literally add a header. If a `content-type` header is already configured (for example through a server wide default), this means we end up with 2 content-type headers, like so: ``` content-type: text/html content-type: application/json access-control-allow-origin: * ``` That doesn't make sense. Instead, we want the content type of that block to only be `application/json` which we can achieve using `default_type` instead. Signed-off-by: Daniele Sluijters <daenney@users.noreply.github.com>
2020-11-22fix MDMatthew Hodgson1-2/+2
2020-11-22fix ancient changelog to be MDMatthew Hodgson1-150/+146
2020-11-19Improve error checking for OIDC/SAML mapping providers (#8774)Patrick Cloke7-29/+137
Checks that the localpart returned by mapping providers for SAML and OIDC are valid before registering new users. Extends the OIDC tests for existing users and invalid data.
2020-11-19SAML: Allow specifying the IdP entityid to use. (#8630)Ben Banfield-Zanin4-1/+21
If the SAML metadata includes multiple IdPs it is necessary to specify which IdP to redirect users to for authentication.
2020-11-19Consistently use room_id from federation request body (#8776)Richard van der Hoff5-54/+49
* Consistently use room_id from federation request body Some federation APIs have a redundant `room_id` path param (see https://github.com/matrix-org/matrix-doc/issues/2330). We should make sure we consistently use either the path param or the body param, and the body param is easier. * Kill off some references to "context" Once upon a time, "rooms" were known as "contexts". I think this kills of the last references to "contexts".
2020-11-18Improve appservice handler to send only the most recent read receipts when ↵Will Hunt4-3/+10
no stream_id is stored. (#8744) * Make this line debug (it's noisy) * Don't include from_key for presence if we are at 0 * Limit read receipts for all rooms to 100 * changelog.d/8744.bugfix * Allow from_key to be None * Update 8744.bugfix * The from_key is superflous * Update comment
2020-11-18Fix tests on develop (#8777)Erik Johnston2-16/+1
This was broken due to #8617 and #8761.
2020-11-18SAML: Document allowing a clock/time difference from IdP (#8731)Marcus Schopen3-0/+13
Updates the sample configuration with the pysaml2 configuration for accepting clock skew/drift between the homeserver and IdP.
2020-11-18Update changelog v1.23.0 github/release-v1.23.0 release-v1.23.0Erik Johnston1-1/+1
2020-11-18Fix formatting in upgradesErik Johnston1-1/+1
2020-11-18Update changelogErik Johnston1-0/+4
2020-11-18 1.23.0Erik Johnston4-2/+16
2020-11-17Cap the version of prometheus_client to <v0.9.0 in the dockerfile (#8767)Andrew Morgan3